DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG�
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://issues.apache.org/bugzilla/show_bug.cgi?id=35292>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND�
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=35292


[EMAIL PROTECTED] changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEEDINFO                    |ASSIGNED




------- Additional Comments From [EMAIL PROTECTED]  2005-06-10 19:52 -------
OK, there are a few alternatives here:

- take the hit on the uncommon path where the read() doesn't get EOF first time
through, and keep calling read()/apr_time_now() until 30 seconds have *really*
passed

pro: equally as safe as 1.3 code
con: more overhead

- bump the tmp buffer size to 8K and lower the read() timeout to 1 second.  this
way the server could eat 30*8K=245K bytes without additional overhead, giving a
significantly better chance of getting the response to the client than just
15*512=~7K

pro: little more overhead than current 2.0 code
con: still less safe than 1.3

-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to